Revision Beginner � Intermediate CompTIA / Certification / Exam Prep

CompTIA Security+ SY0-701

A revision reference for the Security+ SY0-701 exam � covering all five domains, key concepts, important terminology, and exam strategy tips. Based on the official CompTIA exam objectives.

90 questions / 90 mins Pass mark: 750 / 900 CompTIA

// Exam Overview

DetailValue
Exam codeSY0-701
Number of questionsUp to 90 (multiple choice + performance-based)
Duration90 minutes
Passing score750 out of 900
Recommended experience2 years IT with a security focus, CompTIA Network+ recommended
RenewalEvery 3 years via CEs or retake

Domain 1

General Security Concepts � 12%

Domain 2

Threats, Vulnerabilities & Mitigations � 22%

Domain 3

Security Architecture � 18%

Domain 4

Security Operations � 28%

Domain 5

Security Program Management & Oversight � 20%

// Domain 1 � General Security Concepts (12%)

CIA Triad

PrincipleDefinitionExample control
ConfidentialityOnly authorised parties can access informationEncryption, access controls, MFA
IntegrityData is accurate and has not been tampered withHashing, digital signatures, version control
AvailabilitySystems and data are accessible when neededRedundancy, backups, DDoS mitigation

Authentication factors

FactorWhat it isExamples
Something you knowKnowledge factorPassword, PIN, security question
Something you havePossession factorSmart card, hardware token, OTP app
Something you areInherence factorFingerprint, facial recognition, iris scan
Somewhere you areLocation factorGeolocation, IP restriction
Something you doBehaviour factorTyping pattern, gait analysis

Encryption types

TypeKey modelExamplesUse case
SymmetricSame key for encrypt & decryptAES, 3DES, RC4Fast � bulk data encryption
AsymmetricPublic/private key pairRSA, ECC, Diffie-HellmanKey exchange, digital signatures, PKI
HashingOne-way, no keySHA-256, MD5 (insecure), bcryptIntegrity verification, password storage

Key controls to know

Control typeDefinitionExamples
PreventiveStops an incident happeningFirewall, MFA, encryption, access control
DetectiveIdentifies when an incident has occurredIDS, SIEM, audit logs, cameras
CorrectiveReduces impact / restores after incidentBackups, patch management, IR plan
DeterrentDiscourages attackersWarning banners, security cameras, policies
CompensatingAlternative when primary control can't be usedNetwork isolation for unpatched legacy system
DirectiveTells people what to doPolicies, procedures, training

// Domain 2 � Threats, Vulnerabilities & Mitigations (22%)

Malware types

TypeDefinition
VirusAttaches to legitimate files and spreads when the file is run � requires host file, user action to spread
WormSelf-replicates across networks without user interaction � exploits vulnerabilities automatically
TrojanDisguised as legitimate software � creates backdoor, RAT, or drops additional malware
RansomwareEncrypts files and demands payment for decryption key
RootkitHides malware, processes, or attacker presence at OS or kernel level
KeyloggerRecords keystrokes � captures credentials, sensitive data
SpywareMonitors user activity and sends data to attacker without consent
BotnetNetwork of infected hosts controlled by a C2 server � used for DDoS, spam, cryptomining
Logic bombTriggers malicious action when a specific condition is met (date, event, login)

Attack types to know

AttackHow it works
SQL InjectionMalicious SQL injected via input fields � manipulates database queries
XSS (Cross-Site Scripting)Malicious script injected into web pages viewed by other users
CSRFForces authenticated user to perform unintended actions on a trusted site
Buffer overflowMore data written to a buffer than it can hold � overwrites adjacent memory
Man-in-the-Middle (MitM)Attacker intercepts and potentially modifies communication between two parties
Pass-the-HashNTLM hash used to authenticate without knowing the plaintext password
KerberoastingService ticket requested and cracked offline to get service account password
Credential stuffingLeaked username/password combos tried at scale against multiple services
Birthday attackExploits hash collision probability � finds two inputs producing the same hash
Rainbow table attackPre-computed hash table used to reverse hash values � mitigated by salting

// Domain 3 � Security Architecture (18%)

Network security concepts

ConceptDefinition
DMZ (Demilitarised Zone)Network segment between internal network and internet � hosts public-facing services (web servers, mail)
Zero TrustNever trust, always verify � every access request authenticated and authorised regardless of location
Network segmentationDividing a network into isolated segments using VLANs or firewalls � limits lateral movement
MicrosegmentationFine-grained segmentation extending to individual workloads � common in cloud and SDN environments
Air gapPhysical isolation � no network connection to external systems
VPN (Virtual Private Network)Encrypted tunnel over an untrusted network � site-to-site or remote access
SD-WANSoftware-defined WAN � manages multiple WAN links with centralised control and policy
SASESecure Access Service Edge � converges networking and security into a cloud-delivered service

Cloud security

ModelProvider managesCustomer manages
IaaS (Infrastructure)Physical, network, hypervisorOS, middleware, runtime, apps, data
PaaS (Platform)Physical through runtimeApplications and data
SaaS (Software)EverythingData and user access

// Domain 4 � Security Operations (28%)

Domain 4 is the largest and covers day-to-day SOC and security operations work. High weight � spend the most time here.

Incident response phases

PhaseKey activities
1. PreparationIR plan, tools, team training, playbooks, communication channels
2. Detection & AnalysisAlert triage, log analysis, determine scope and severity, declare incident
3. ContainmentShort-term containment (isolate), evidence preservation, long-term containment
4. EradicationRemove malware, patch vulnerability, reset credentials
5. RecoveryRestore systems, verify clean state, monitor for re-infection
6. Lessons LearnedPost-incident review, update playbooks, improve detection

Vulnerability management

TermDefinition
CVECommon Vulnerabilities and Exposures � unique identifier for a known vulnerability
CVSSCommon Vulnerability Scoring System � 0�10 severity score based on exploitability and impact
Zero-dayVulnerability unknown to the vendor � no patch exists at time of exploitation
Patch managementProcess for identifying, testing, and deploying patches across the environment
Vulnerability scanAutomated scan identifying known vulnerabilities � non-intrusive, no exploitation
Penetration testAuthorised simulated attack � actively exploits vulnerabilities to demonstrate real impact

Digital forensics order of volatility

Collect the most volatile evidence first � it disappears fastest.

OrderSource
1CPU registers, cache
2RAM (running processes, network connections, open files)
3Swap / pagefile
4Network state (ARP cache, routing table)
5Running processes
6Disk (filesystem, logs)
7Remote logging and monitoring data
8Physical configuration, network topology
9Archival media (backups, optical)

// Domain 5 � Security Program Management & Oversight (20%)

Risk management

TermDefinition
RiskLikelihood � Impact � the potential for harm from a threat exploiting a vulnerability
ThreatPotential cause of an incident (attacker, natural disaster, insider)
VulnerabilityWeakness that could be exploited by a threat
Risk acceptanceAcknowledging and accepting the risk without additional controls
Risk avoidanceEliminating the activity that creates the risk
Risk transferenceShifting risk to a third party � cyber insurance, outsourcing
Risk mitigationImplementing controls to reduce likelihood or impact
SLESingle Loss Expectancy = Asset Value � Exposure Factor
ALEAnnual Loss Expectancy = SLE � Annual Rate of Occurrence

Compliance frameworks

Framework / RegulationScope
NIST CSFCybersecurity framework � Identify, Protect, Detect, Respond, Recover
ISO 27001International ISMS standard � risk-based approach to information security
PCI DSSPayment Card Industry � organisations handling cardholder data
HIPAAUS healthcare � protecting patient health information (PHI)
GDPREU � personal data protection and privacy rights
SOC 2Service organisation controls � security, availability, confidentiality, privacy

// Key Acronyms

AcronymFull form
AAAAuthentication, Authorisation, Accounting
ACLAccess Control List
BYODBring Your Own Device
CASBCloud Access Security Broker
DACDiscretionary Access Control
DLPData Loss Prevention
EDREndpoint Detection and Response
HSMHardware Security Module
IAMIdentity and Access Management
IDS / IPSIntrusion Detection / Prevention System
MACMandatory Access Control
MDMMobile Device Management
MFAMulti-Factor Authentication
NACNetwork Access Control
PKIPublic Key Infrastructure
RBACRole-Based Access Control
SIEMSecurity Information and Event Management
SOARSecurity Orchestration, Automation and Response
SOCSecurity Operations Centre
TTPTactics, Techniques, and Procedures
UATUser Acceptance Testing
UEBAUser and Entity Behaviour Analytics
WAFWeb Application Firewall

// Exam Tips

Domain 4 is 28% of the exam. Security Operations is the biggest domain � prioritise it. Focus on incident response phases, threat hunting, log analysis, vulnerability management, and digital forensics concepts.

Performance-based questions (PBQs) appear first. These are drag-and-drop, simulation, or scenario questions. They take longer � if you're stuck, flag and come back. Don't let one PBQ eat up 20 minutes.

Read every answer before choosing. Security+ loves "best answer" questions where multiple options are technically correct � the right answer is the most appropriate for the given scenario and security principle.

Know your acronyms cold. The exam doesn't always spell out what acronyms stand for. If you see CASB, UEBA, or SOAR in a question and you don't know what they mean, you can't answer it correctly.

Think like a security professional, not a hacker. Security+ tests your ability to select appropriate security controls and respond correctly � not how to exploit systems. When in doubt, the least-privilege, most-controlled option is usually correct.